Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Key (cryptography)

Known as: Encryption key, Cryptographic key, Key (cryptology) 
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively… Expand
  • table 1
  • figure 2
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Quantum Cryptography was born in the early seventies when Stephen Wiesner wrote “Conjugate Coding”, which unfortunately took more… Expand
  • figure 2.3
  • figure 2.4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Abstract. In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete… Expand
  • table 1
  • table 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a technique to reliably generate a cryptographic key from a user's voice while speaking a password. The key resists… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In this article we give guidelines for the determination of cryptographic key sizes. Our recommendations are based on a set of… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Informal arguments that cryptographic protocols are secure can be made rigorous using inductive definitions. The approach is… Expand
  • figure 4
Is this relevant?
Highly Cited
1997
Highly Cited
1997
In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We describe initial results from an apparatus and protocol designed to implement quantum public key distribution, by which two… Expand
Is this relevant?
Highly Cited
1979
Highly Cited
1979
  • G. R. Blakley
  • International Workshop on Managing Requirements…
  • 1979
  • Corpus ID: 201812983
Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key… Expand
Is this relevant?